Jump to content

Jessica Brown

Administrators
  • Joined

  • Last visited

Everything posted by Jessica Brown

  1. Game Writing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Game Writing Narrative Skills for Videogames by Chris Bateman Publisher Bloomsbury Publishing USA Published Date 2021-01-28 Page Count 456 Categories Social Science / Media Studies, Computers / Programming / Games, Performing Arts / Film / Screenwriting, Games & Activities / Video & Mobile, Performing Arts / Television / Screenwriting, Social Science / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 150134899X As the videogame industry has grown up, the need for better stories and characters has dramatically increased, yet traditional screenwriting techniques alone cannot equip writers for the unique challenges of writing stories where the actions and decisions of a diverse range of players are at the centre of every narrative experience. Game Writing: Narrative Skills for Videogames was the first book to demystify the emerging field of game writing by identifying and explaining the skills required for creating videogame narrative. Through the insights and experiences of professional game writers, this revised edition captures a snapshot of the narrative skills employed in today's game industry and presents them as practical articles accompanied by exercises for developing the skills discussed. The book carefully explains the foundations of the craft of game writing, detailing all aspects of the process from the basics of narrative to guiding the player and the challenges of nonlinear storytelling. Throughout the book there is a strong emphasis on the skills developers and publishers expect game writers to know. This second edition brings the material up to date and adds four new chapters covering MMOs, script formats, narrative design for urban games, and new ways to think about videogame narrative as an art form. Suitable for both beginners and experienced writers, Game Writing is the essential guide to all the techniques of game writing. There's no better starting point for someone wishing to get into this exciting field, whether they are new game writers wishing to hone their skills, or screenwriters hoping to transfer their skills to the games industry. More Information
  2. Jessica Brown posted a post in a topic in Programming
    Vortragsauzüge /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Vortragsauzüge by Wolfgang Händler, Ernst Peschl, Heinz Unger Publisher Birkhauser Verglag Published Date 1967 Page Count 316 Categories Automata Language DE Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN N/A No description available. More Information
  3. Fundamentals of Relational Database Management Systems /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Fundamentals of Relational Database Management Systems by S. Sumathi, S. Esakkirajan Publisher Springer Science & Business Media Published Date 2007-02-13 Page Count 776 Categories Computers / Databases / General, Mathematics / Applied, Computers / Intelligence (AI) & Semantics, Computers / Information Technology Language EN Average Rating 4 (based on 8 ratings) Maturity Rating No Mature Content Detected ISBN 3540483977 Information is a valuable resource to an organization. Computer software provides an efficient means of processing information, and database systems are becoming an increasingly common means by which it is possible to store and retrieve information in an effective manner. This book provides comprehensive coverage of fundamentals of database management systems. This book is for those who wish a better understanding of relational data modeling, its purpose, its nature, and the standards used in creating relational data models. More Information
  4. Trends and Issues in Instructional Design and Technology /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Trends and Issues in Instructional Design and Technology by Robert A. Reiser, Alison A. Carr-Chellman, John V. Dempsey Publisher Taylor & Francis Group Published Date 2024-08-06 Page Count 626 Categories Art / General, Business & Economics / General, Business & Economics / Economics / General, Computers / Computer Science, Computers / Internet / General, Education / General, Education / Adult & Continuing Education, Education / Curricula, Education / Educational Psychology, Education / Schools / Levels / Higher, Education / Home Schooling, Education / Teaching / General, Education / Computers & Technology, Education / Distance, Open & Online Education, Language Arts & Disciplines / Communication Studies, Medical / Nursing / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1032819758 Trends and Issues in Instructional Design and Technology provides current and future IDT professionals with a clear picture of current and future developments in the field that are likely to impact their careers and the organizations they work for. The fifth edition of this acclaimed, award-winning book has been designed to help instructional design and educational technology students, scholars, and practitioners to acquire the skills and knowledge essential to attaining their professional goals. In addition to the thorough and comprehensive updates made across the text, this revision adds 24 new chapters covering artificial intelligence, alternative ID models, social emotional learning, return on investment, micro-credentials and badging, designing for e-learning, hybrid learning, professional ethics, diversity and accessibility, and more. By exploring the field's purpose and history, theories and models, emerging technologies and environments, and continual challenges and newfound concerns, this text provides an integral survey of the field's contemporary landscape. More Information
  5. The Handbook of Artificial Intelligence /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Handbook of Artificial Intelligence by Avron Barr, Edward A. Feigenbaum, Paul R. Cohen Publisher Addison-Wesley Published Date 1981 Page Count 699 Categories Computers / General, Computers / Artificial Intelligence / General Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0201517310 What is a "heuristic problem-solving program?" How do computers understand English? What are "semantic nets" or "frames?" Can computer programs outperform human experts? Such questions -- asked by scientists, engineers, students, and hobbyists encountering Artificial Intelligence for the first time -- can now be readily answered by The Handbook of Artificial Intelligence, a work which makes the full scope of important techniques and concepts of AI available for the first time to the rapidly expanding world of computer technologists and users. The scope of this handbook is broad: over 200 short articles covering all of the important ideas, techniques, and systems developed during 25 years of research in the AI field. The articles are written for people with no background in AI. Some articles serve as overviews, discussing the various approaches within a subfield, the issues, and the problems. The handbook is a reference work, a textbook, a guide to programming techniques and to the extensive literature of the field, and a book for intellectual browsing. Jargon has been eliminated in each of the short, penetrating articles, and the hierarchical organization of the book allows readers to choose how deeply they wish to delve into a particular subject. Conceived and produced at Stanford University's Department of Computer Science, with contributions from universities and laboratories across the nation, The Handbook of Artificial Intelligence promises to become the standard reference work in the rapidly growing AI field. - Jacket. More Information
  6. Jessica Brown posted a post in a topic in Computers
    Rosmersholm /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Rosmersholm by Henrik Ibsen Publisher BoD - Books on Demand Published Date 2024-04-22 Page Count 94 Categories Poetry / General, Computers / Hardware / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 9791041999378 "Rosmersholm" by Henrik Ibsen is a compelling drama that delves into the complexities of morality, politics, and personal liberation. Set in a rural Norwegian estate, the play follows the protagonist, John Rosmer, a former clergyman, and his relationship with Rebecca West, a spirited and enigmatic woman with progressive ideals. As Rosmer grapples with his own convictions and the legacy of his family, he finds himself drawn into a web of intrigue and betrayal that threatens to shatter the illusions of his sheltered existence. Through its exploration of guilt, redemption, and the clash between tradition and modernity, "Rosmersholm" offers a thought-provoking examination of the human condition and the quest for personal autonomy. Ibsen's penetrating insight and psychological depth make "Rosmersholm" a timeless masterpiece that continues to resonate with audiences today. More Information
  7. Introduction to Algorithms, third edition /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Introduction to Algorithms, third edition by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Publisher MIT Press Published Date 2009-07-31 Page Count 1320 Categories Computers / Programming / Algorithms, Computers / Reference Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0262258102 The latest edition of the essential text and professional reference, with substantial new material on such topics as vEB trees, multithreaded algorithms, dynamic programming, and edge-based flow.Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor. The first edition became a widely used text in universities worldwide as well as the standard reference for professionals. The second edition featured new chapters on the role of algorithms, probabilistic analysis and randomized algorithms, and linear programming. The third edition has been revised and updated throughout. It includes two completely new chapters, on van Emde Boas trees and multithreaded algorithms, substantial additions to the chapter on recurrence (now called “Divide-and-Conquer”), and an appendix on matrices. It features improved treatment of dynamic programming and greedy algorithms and a new notion of edge-based flow in the material on flow networks. Many exercises and problems have been added for this edition. The international paperback edition is no longer available; the hardcover is available worldwide. More Information
  8. Elements of Programming Interviews /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Elements of Programming Interviews The Insiders' Guide by Adnan Aziz, Tsung-Hsien Lee, Amit Prakash Publisher EPI Published Date 2012 Page Count 480 Categories Business & Economics / Careers / Job Hunting, Computers / Software Development & Engineering / General, Computers / Programming / Algorithms, Self-Help / Personal Growth / Success Language EN Average Rating 5 (based on 2 ratings) Maturity Rating No Mature Content Detected ISBN 1479274836 The core of EPI is a collection of over 300 problems with detailed solutions, including 100 figures, 250 tested programs, and 150 variants. The problems are representative of questions asked at the leading software companies. The book begins with a summary of the nontechnical aspects of interviewing, such as common mistakes, strategies for a great interview, perspectives from the other side of the table, tips on negotiating the best offer, and a guide to the best ways to use EPI. The technical core of EPI is a sequence of chapters on basic and advanced data structures, searching, sorting, broad algorithmic principles, concurrency, and system design. Each chapter consists of a brief review, followed by a broad and thought-provoking series of problems. We include a summary of data structure, algorithm, and problem solving patterns. More Information
  9. 📌 Project Name: You-Dont-Know-JS 🔗 URL: https://github.com/getify/You-Dont-Know-JS 📝 Description: A book series (2 published editions) on the JS language. ⭐ Stars: 181187 🛠 Language: Unknown 🤖 AI Summary: The "You Don't Know JS" (YDKJS) is a comprehensive book series dedicated to JavaScript, one of the world's most utilized programming languages. The project's primary purpose is to break down complex JavaScript concepts and illuminate its true identity, moving beyond the basics to dig deep into the language's core. The series, published in two separate editions, provides extensive details while also making it accessible for beginners. The significance of the project lies in its comprehensive approach - the series covers not just the foundational elements of JavaScript, but also discusses advanced topics, making it a valuable resource for both novice programmers and experienced developers looking to deepen their understanding. The YDKJS project plays an essential role in strengthening the JavaScript community by making sophisticated knowledge and best coding practices available to everyone. It essentially functions as an open-source learning platform, enabling the continued growth of JavaScript and its associated technologies.
  10. Microsoft Intune Cookbook /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Microsoft Intune Cookbook Over 75 Recipes for Configuring, Managing, and Automating Your Identities, Apps, and Endpoint Devices by Andrew Taylor Publisher Packt Publishing Published Date 2024-01-19 Page Count 574 Categories Computers / Security / Viruses & Malware, Computers / Operating Systems / Windows Desktop, Computers / System Administration / Windows Administration, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1805126547 Get started with Microsoft Intune and explore its many facets, including task automation with Microsoft Graph Key Features - Create and configure your new mobile device management (MDM) environment - Become an Intune pro by mastering compliance policies, monitoring techniques, reporting practices, and application deployment procedures - Learn how to manage Windows, Android, iOS, and macOS devices using Intune - Purchase of the print or Kindle book includes a free PDF eBook Book Description Microsoft Intune is a cloud-managed mobile device management (MDM) tool that empowers you to manage your end-user device estate across various platforms. While it is an excellent platform, the initial setup and configuration can be a daunting process, and mistakes made early on can be more challenging to resolve later. This book addresses these issues by guiding you through the end-to-end configuration of an Intune environment, incorporating best practices and utilizing the latest functionalities. In addition to setting up your environment, you'll delve into the Microsoft Graph platform to understand the underlying mechanisms behind the web GUI. This knowledge will enable you to automate a significant portion of your daily tasks using PowerShell. By the end of this book, you'll have established an Intune environment that supports Windows, Apple iOS, Apple macOS, and Android devices. You'll possess the expertise to add new configurations, policies, and applications, tailoring an environment to your specific requirements. Additionally, you'll have the ability to troubleshoot any issues that may arise and package and deploy your company applications. Overall, this book is an excellent resource for anyone who wants to learn how to use Microsoft Intune to manage their organization's end-user devices. What you will learn - Set up your Intune tenant and associated platform connections - Create and deploy device policies to your organization's devices - Find out how to package and deploy your applications - Explore different ways to monitor and report on your environment - Leverage PowerShell to automate your daily tasks - Understand the underlying workings of the Microsoft Graph platform and how it interacts with Intune Who this book is for This book is for IT professionals, end-user device administrators, and system administrators looking to transition to cloud-managed devices or enhance their current environment. Table of Contents - Getting Started with Microsoft Intune - Configuring Your New Tenant for Windows Devices - Securing Your Windows Devices with Security Policies - Setting Up Enrollment and Updates for Windows - Android Device Management - Apple iOS Device Management - macOS Device Management - Setting Up Your Compliance Policies - Monitoring Your New Environment - Looking at Reporting - Packaging Your Windows Applications - PowerShell Scripting Across Intune - Tenant Administration - Looking at Intune Suite More Information
  11. Jessica Brown posted a post in a topic in Cloud Computing
    Real-World Hadoop /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Real-World Hadoop by Ted Dunning, Ellen Friedman Publisher "O'Reilly Media, Inc." Published Date 2015-03-24 Page Count 104 Categories Computers / Data Science / General, Computers / Database Administration & Management, Computers / Data Science / Data Analytics, Computers / Data Science / Data Warehousing, Computers / Databases / Servers, Computers / System Administration / Storage & Retrieval, Computers / Business & Productivity Software / Databases Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491928921 If you’re a business team leader, CIO, business analyst, or developer interested in how Apache Hadoop and Apache HBase-related technologies can address problems involving large-scale data in cost-effective ways, this book is for you. Using real-world stories and situations, authors Ted Dunning and Ellen Friedman show Hadoop newcomers and seasoned users alike how NoSQL databases and Hadoop can solve a variety of business and research issues. You’ll learn about early decisions and pre-planning that can make the process easier and more productive. If you’re already using these technologies, you’ll discover ways to gain the full range of benefits possible with Hadoop. While you don’t need a deep technical background to get started, this book does provide expert guidance to help managers, architects, and practitioners succeed with their Hadoop projects. Examine a day in the life of big data: India’s ambitious Aadhaar projectReview tools in the Hadoop ecosystem such as Apache’s Spark, Storm, and Drill to learn how they can help youPick up a collection of technical and strategic tips that have helped others succeed with HadoopLearn from several prototypical Hadoop use cases, based on how organizations have actually applied the technologyExplore real-world stories that reveal how MapR customers combine use cases when putting Hadoop and NoSQL to work, including in production More Information
  12. The Enterprise Cloud /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Enterprise Cloud Best Practices for Transforming Legacy IT by James Bond Publisher "O'Reilly Media, Inc." Published Date 2015-05-19 Page Count 396 Categories Computers / Database Administration & Management, Computers / Databases / Servers, Computers / Distributed Systems / General, Computers / Internet / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491907851 Despite the buzz surrounding the cloud computing, only a small percentage of organizations have actually deployed this new style of IT—so far. If you're planning your long-term cloud strategy, this practical book provides insider knowledge and actionable real-world lessons regarding planning, design, operations, security, and application transformation. This book teaches business and technology managers how to transition their organization's traditional IT to cloud computing. Rather than yet another book trying to sell or convince readers on the benefits of clouds, this book provides guidance, lessons learned, and best practices on how to design, deploy, operate, and secure an enterprise cloud based on real-world experience. Author James Bond provides useful guidance and best-practice checklists based on his field experience with real customers and cloud providers. You'll view cloud services from the perspective of a consumer and as an owner/operator of an enterprise private or hybrid cloud, and learn valuable lessons from successful and less-than-successful organization use-case scenarios. This is the information every CIO needs in order to make the business and technical decisions to finally execute on their journey to cloud computing. Get updated trends and definitions in cloud computing, deployment models, and for building or buying cloud servicesDiscover challenges in cloud operations and management not foreseen by early adoptersUse real-world lessons to plan and build an enterprise private or hybrid cloudLearn how to assess, port, and migrate legacy applications to the cloudIdentify security threats and vulnerabilities unique to the cloudEmploy a cloud management system for your enterprise (private or multi-provider hybrid) cloud ecosystemUnderstand the challenges for becoming an IT service broker leveraging the power of the cloud More Information
  13. Identity, Authentication, and Access Management in OpenStack /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Identity, Authentication, and Access Management in OpenStack Implementing and Deploying Keystone by Steve Martinelli, Henry Nash, Brad Topol Publisher "O'Reilly Media, Inc." Published Date 2015-12-08 Page Count 130 Categories Computers / Information Technology, Computers / Software Development & Engineering / General, Computers / Software Development & Engineering / Systems Analysis & Design, Computers / System Administration / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491940808 Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access. Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer—as well as key practices for safeguarding your cloud's ongoing security. Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after features—support for federated identity More Information
  14. Machines Like Me /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Machines Like Me A Novel by Ian McEwan Publisher Diversified Publishing Published Date 2019-04-23 Page Count 400 Categories Fiction / Literary, Fiction / Psychological, Fiction / Science Fiction / General, Fiction / Alternative History, Fiction / City Life Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0593152816 "Machines Like Me occurs in an alternative 1980s London. Britain has lost the Falklands War, Margaret Thatcher battles Tony Benn for power, and Alan Turing achieves a breakthrough in artificial intelligence. In a world not quite like this one, two lovers will be tested beyond their understanding. Charlie, drifting through life and dodging full-time employment, is in love with Miranda, a bright student who lives with a terrible secret. When Charlie comes into money, he buys Adam, one of the first batch of synthetic humans. With Miranda's assistance, he co-designs Adam's personality. This near-perfect human is beautiful, strong, and clever--a love triangle soon forms. These three beings will confront a profound moral dilemma. Ian McEwan's subversive and entertaining new novel poses fundamental questions: What makes us human? Our outward deeds or our inner lives? Could a machine understand the human heart? This provocative and thrilling tale warns against the power to invent things beyond our control"-- More Information
  15. Data Science and Predictive Analytics /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Data Science and Predictive Analytics Biomedical and Health Applications using R by Ivo D. Dinov Publisher Springer Nature Published Date 2023-02-16 Page Count 918 Categories Computers / Information Theory, Computers / Artificial Intelligence / General, Mathematics / Probability & Statistics / General, Medical / General, Computers / Database Administration & Management, Computers / Programming / Algorithms, Computers / Information Technology, Computers / Social Aspects Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 3031174836 This textbook integrates important mathematical foundations, efficient computational algorithms, applied statistical inference techniques, and cutting-edge machine learning approaches to address a wide range of crucial biomedical informatics, health analytics applications, and decision science challenges. Each concept in the book includes a rigorous symbolic formulation coupled with computational algorithms and complete end-to-end pipeline protocols implemented as functional R electronic markdown notebooks. These workflows support active learning and demonstrate comprehensive data manipulations, interactive visualizations, and sophisticated analytics. The content includes open problems, state-of-the-art scientific knowledge, ethical integration of heterogeneous scientific tools, and procedures for systematic validation and dissemination of reproducible research findings.Complementary to the enormous challenges related to handling, interrogating, and understanding massive amounts of complex structured and unstructured data, there are unique opportunities that come with access to a wealth of feature-rich, high-dimensional, and time-varying information. The topics covered in Data Science and Predictive Analytics address specific knowledge gaps, resolve educational barriers, and mitigate workforce information-readiness and data science deficiencies. Specifically, it provides a transdisciplinary curriculum integrating core mathematical principles, modern computational methods, advanced data science techniques, model-based machine learning, model-free artificial intelligence, and innovative biomedical applications. The book’s fourteen chapters start with an introduction and progressively build foundational skills from visualization to linear modeling, dimensionality reduction, supervised classification, black-box machine learning techniques, qualitative learning methods, unsupervised clustering, model performance assessment, feature selection strategies, longitudinal data analytics, optimization, neural networks, and deep learning. The second edition of the book includes additional learning-based strategies utilizing generative adversarial networks, transfer learning, and synthetic data generation, as well as eight complementary electronic appendices. This textbook is suitable for formal didactic instructor-guided course education, as well as for individual or team-supported self-learning. The material is presented at the upper-division and graduate-level college courses and covers applied and interdisciplinary mathematics, contemporary learning-based data science techniques, computational algorithm development, optimization theory, statistical computing, and biomedical sciences. The analytical techniques and predictive scientific methods described in the book may be useful to a wide range of readers, formal and informal learners, college instructors, researchers, and engineers throughout the academy, industry, government, regulatory, funding, and policy agencies. The supporting book website provides many examples, datasets, functional scripts, complete electronic notebooks, extensive appendices, and additional materials. More Information
  16. Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part I /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part I by Leszek Borzemski, Adam Grzech, Jerzy Świątek, Zofia Wilimowska Publisher Springer Published Date 2016-09-17 Page Count 263 Categories Technology & Engineering / Engineering (General), Technology & Engineering / Telecommunications, Computers / Artificial Intelligence / General, Technology & Engineering / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 331946583X This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18–20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I—addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II—discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things. Part III—discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV—dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods. More Information
  17. How to Build a Person /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } How to Build a Person A Prolegomenon by John L. Pollock Publisher MIT Press Published Date 1989 Page Count 189 Categories Computers / Artificial Intelligence / General, Philosophy / General, Psychology / General, Psychology / Cognitive Psychology & Cognition Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0262161133 Building a person has been an elusive goal in artificial intelligence. This failure, John Pollock argues, is because the problems involved are essentially philosophical; what is needed for the construction of a person is a physical system that mimics human rationality. Pollock describes an exciting theory of rationality and its partial implementation in OSCAR, a computer system whose descendants will literally be persons. In developing the philosophical superstructure for this bold undertaking, Pollock defends the conception of man as an intelligent machine and argues that mental states are physical states and persons are physical objects as described in the fable of Oscar, the self conscious machine. Pollock brings a unique blend of philosophy and artificial intelligence to bear on the vexing problem of how to construct a physical system that thinks, is self conscious, has desires, fears, intentions, and a full range of mental states. He brings together an impressive array of technical work in philosophy to drive theory construction in AI. The result is described in his final chapter on "cognitive carpentry." John Pollock is Professor of Philosophy and Cognitive Science at the University of Arizona. A Bradford Book More Information
  18. Jessica Brown posted a post in a topic in Linux
    Linux per tutti. Con DVD-ROM /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux per tutti. Con DVD-ROM by Rickford Grant Publisher Apogeo Editore Published Date 2004 Page Count 320 Categories Computers / Operating Systems / Linux Language IT Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 8850322496 Installare un sistema Linux senza problemi e utilizzarlo per le operazioni quotidiane. Linux, nelle sue ultime versioni, è molto più semplice di quello che si pensi. L'installazione, grafica e guidata, è altrettanto semplice di quella di Windows. Inoltre il sistema viene fornito già con un insieme di applicativi di uso quotidiano estremamente importanti. Internet e posta elettronica, programmi di videoscrittura e fogli di calcolo, gestione di immagini e video, musica e multimedia, archiviazione e molto altro ancora. Per chi desidera avere un sistema potente, completo, alternativo a Windows e completamente gratuito, questo è il punto di partenza migliore. More Information
  19. Jessica Brown posted a post in a topic in Linux
    Operating System Concepts /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Operating System Concepts by Abraham Silberschatz, Peter B. Galvin, Greg Gagne Publisher Wiley Published Date 2014 Page Count 829 Categories Operating systems (Computers) Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 1118093755 The ninth edition of Operating System Concepts continues to evolve to provide a solid theoretical foundation for understanding operating systems. This edition has been updated with more extensive coverage of the most current topics and applications, improved conceptual coverage and additional content to bridge the gap between concepts and actual implementations. A new design allows for easier navigation and enhances reader motivation. Additional end–of–chapter, exercises, review questions, and programming exercises help to further reinforce important concepts. WileyPLUS, including a test bank, self–check exercises, and a student solutions manual, is also part of the comprehensive support package. More Information
  20. SUSE Linux Toolbox /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } SUSE Linux Toolbox 1000+ Commands for OpenSUSE and SUSE Linux Enterprise by Christopher Negus, Francois Caen Publisher John Wiley & Sons Published Date 2007-12-05 Page Count 307 Categories Computers / Networking / General, Computers / Operating Systems / General, Computers / Operating Systems / Linux Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0470082925 Explore a ton of powerful SUSE Linux commands This handy, compact guide teaches you to use SUSE Linux as the experts do: from the command line. Try out over 1000 commands to find and get software, monitor system health and security, and access network resources. Apply skills you learn from this book to use and administer desktops and servers running openSUSE and SUSE Linux Enterprise or any other Linux distribution. Expand your Linux expertise in these and other areas: Using the shell Finding online software Working with files Playing with music and images Administering file systems Backing up data Checking and managing running processes Accessing network resources Handling remote system administration Locking down security More Information
  21. Beginning Ubuntu Server Administration /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Beginning Ubuntu Server Administration From Novice to Professional by Sander van Vugt Publisher Apress Published Date 2007-12-17 Page Count 355 Categories Computers / Operating Systems / Linux, Computers / Programming / General, Computers / Software Development & Engineering / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1590599233 You love it as the world’s most popular desktop Linux distribution, and now Ubuntu is available at a server near you. Embracing the very same features desktop users have grown to love, system administrators are rapidly adopting Ubuntu due to their ability to configure, deploy, and manage network services more effectively than ever. Beginning Ubuntu Server Administration guides you through all of the key configuration and administration tasks you’ll need to know. Whether you’re interested in adopting Ubuntu within a Fortune 500 environment or just want to use Ubuntu to manage your home network, this book is your go–to guide to using the distribution securely for a wide variety of network services. Topics include file, print, web, and FTP management, command–line tips and tricks, automated installation, configuration and deployment processes, and kernel management. What you’ll learn Effectively and securely install, update, and deploy your Ubuntu server Configure your server to operate most effectively for a wide variety of purposes, including as a web server, FTP server, and a file and printer manager Rev up your command–line knowledge by taking advantage of little–known shell–related features, tips, and tricks Remotely manage your server through a wide variety of services Who this book is for System administrators and application developers seeking to use Ubuntu as a Linux server. Table of Contents Installing Ubuntu Server Getting the Most Out of the Command Line Performing Essential System Administration Tasks Performing File System Management Tasks Configuring Your Server for Security Setting the System to Your Hand Running It Anyway You Like Making Connection Configuring Network Infrastructure Services Using Ubuntu Server As a File and Print Server Setting Up Web Services Multiplying Your Server More Information
  22. Kali Linux Web Penetration Testing Cookbook /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Kali Linux Web Penetration Testing Cookbook by Gilberto Najera-Gutierrez Publisher Packt Publishing Published Date 2016 Page Count 296 Categories Computers / Security / Network Security, Computers / Operating Systems / Linux, Computers / Internet / Online Safety & Privacy Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 178439291X Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This Book* Familiarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of them* Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits* Learn how to prevent vulnerabilities in web applications before an attacker can make the most of itWho This Book Is ForThis book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.What You Will Learn* Set up a penetration testing laboratory in a secure way* Find out what information is useful to gather when performing penetration tests and where to look for it* Use crawlers and spiders to investigate an entire website in minutes* Discover security vulnerabilities in web applications in the web browser and using command-line tools* Improve your testing efficiency with the use of automated vulnerability scanners* Exploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenarios* Set up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web server* Create a malicious site that will find and exploit vulnerabilities in the user's web browser* Repair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's securityIn DetailWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing.This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users.Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gathering information about the system and the application to identifying vulnerabilities through manual testing and the use of vulnerability scanners to both basic and advanced exploitation techniques that may lead to a full system compromise. Finally, we will put this into the context of OWASP and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of the book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities.Style and approachTaking a recipe-based approach to web security, this book has been designed to cover each stage of a penetration test, with descriptions on how tools work and why certain programming or configuration practices can become security vulnerabilities that may put a whole system, or network, at risk. Each topic is presented as a sequence of tasks and contains a proper explanation of why each task is performed and what it accomplishes. More Information
  23. Linux for Windows NT/2000 Administrators /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux for Windows NT/2000 Administrators The Secret Decoder Ring by Mark Minasi, Dan York, Craig Hunt Publisher SYBEX Published Date 2000 Page Count 526 Categories Computers / Operating Systems / UNIX, Computers / Operating Systems / Windows Server, Computers / Operating Systems / Linux, Computers / Hardware / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0782127304 Perfect for Windows NT/2000 System Administrators daunted with the task of convergence to a world of both Linux and Windows NT/2000, Linux for Windows NT/2000 Administrators: The Secret Decoder Ring provides the tools necessary to translate Linux concepts and practices into terms Windows administrators understand. Co-written by Windows guru Mark Minasi, this book explains how Linux works, looks at its strengths and weaknesses in relation to Windows, and helps the administrators evaluate it for use in the enterprise. More Information
  24. Extend Microsoft Access Applications to the Cloud /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Extend Microsoft Access Applications to the Cloud by Andrew Couch Publisher Pearson Education Published Date 2015 Page Count 403 Categories Computers / General, Computers / Database Administration & Management, Computers / Programming / General, Computers / Internet / Web Services & APIs, Computers / Business & Productivity Software / Databases, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0735667683 Build new Access cloud web apps and migrate desktop databases to the cloud This is your complete, practical guide to creating Microsoft Access web apps and migrating existing databases to the cloud. Access MVP Andrew Couch guides you through the entire web app life cycle, from design through deployment and upgrades. After introducing Microsoft Office 365 and the web app development environment, he reviews key issues associated with moving data into a web app or creating cloud apps with new data. Next, he drills down into app construction, from table design to integration. You'll learn how to extend Access with Microsoft Azure SQL, PowerPivot, Visual Studio 2013, SQL Server Reporting Services (SSRS), and Apps for Office, and master important new enhancements in Office 365 SP1. Learn best practices and techniques to: Capitalize on key Office 365 features in your Access web apps Design and integrate all the features of Access web apps Make your desktop databases compatible with web app table structures Implement and test business rules by using the Macro Programming Tools Understand how your app design translates to objects in the cloud-based Azure SQL Database Use Microsoft SQL Server Management Studio (SSMS) to connect with and manage web apps Improve reporting with PowerPivot, Visual Studio 2013, and SSRS Extend Access web apps with Apps for Office features Capitalize on Office 365 SP1 improvements in change deployment, intellectual property protection, and integration Get all code samples, including complete apps, at: http://aka.ms/AccessApps/files About This Book For experienced Access developers who want a deep understanding of web app design and implementation For new web app developers who want to develop Access web apps with Office 365 More Information
  25. Virtualizing SQL Server with VMware /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Virtualizing SQL Server with VMware Doing IT Right by Michael Corey, Jeff Szastak, Michael Webster Publisher Pearson Education Published Date 2014 Page Count 478 Categories Computers / Database Administration & Management, Computers / System Administration / Virtualization & Containerization, Computers / Languages / SQL, Computers / Business & Productivity Software / Spreadsheets, Computers / Certification Guides / General, Computers / Internet / Web Services & APIs Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0321927753 The start-to-finish guide to virtualizing business-critical SQL Server databases on VMware vSphere 5 By virtualizing business-critical databases, enterprises can drive far more value from existing IT infrastructure. But squeezing maximum performance out of a virtualized database instance is an art as much as a science. This indispensable start-to-finish guide brings together all the techniques, tips, and insights you need to succeed. Drawing on unsurpassed personal experience, three leading experts share complete best practices for deploying business-critical database servers in virtualized vSphere 5 environments. They cover the entire project lifecycle, bridging technical and communications gaps between SQL Server and VMware professionals that often make database virtualization more difficult than it needs to be. You'll find specific guidance for architects and administrators responsible for systems, storage, databases, applications, or VMware virtualization. The authors also present detailed, start-to-finish coverage of performance baselining and testing: all you need to make your virtualized databases as fast as they are cost effective. Although this book focuses on SQL, the authors' proven guidance for enhancing performance can be leveraged by any IT professional virtualizing a demanding Tier 1 application. Coverage includes * Business cases for database virtualization: consolidation, Database as a Service (DaaS), efficiency, and "SLAs on steroids" * Using the redundancy inherent in virtualization to improve availability * Constructing a careful, conservative implementation plan * Balancing disk, CPU, memory, and network for superior performance * Mastering the five key principles of database storage design * Leveraging memory: SQL MAX, page locking, NUMA, reservations, swapping, large memory pages, and more * Ensuring responsiveness by providing a fast, reliable, low-latency network * Supporting advanced AlwaysOn Failover Cluster Instances and Availability Groups * Baselining physical systems and properly determining resource requirements * Configuring performance tests from beginning to end * Migrating existing SQL Server databases onto a vSphere platform * Avoiding traps and pitfalls in virtualizing production databases * Managing and monitoring virtualized database instances and resources More Information

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.